SonarSnoop: active acoustic side-channel attacks
dc.contributor.author | Cheng, Peng | |
dc.contributor.author | Bagci, Ibrahim Ethem | |
dc.contributor.author | Roedig, Utz | |
dc.contributor.author | Yan, Jeff | |
dc.contributor.funder | Knut och Alice Wallenbergs Stiftelse | en |
dc.date.accessioned | 2019-09-12T15:25:08Z | |
dc.date.available | 2019-09-12T15:25:08Z | |
dc.date.issued | 2019-07-05 | |
dc.description.abstract | We report the first active acoustic side-channel attack. Speakers are used to emit human inaudible acoustic signals, and the echo is recorded via microphones, turning the acoustic system of a smart phone into a sonar system. The echo signal can be used to profile user interaction with the device. For example, a victim’s finger movements can be inferred to steal Android unlock patterns. In our empirical study, the number of candidate unlock patterns that an attacker must try to authenticate herself to a Samsung S4 phone can be reduced by up to 70% using this novel acoustic side-channel. The attack is entirely unnoticeable to victims. Our approach can be easily applied to other application scenarios and device types. Overall, our work highlights a new family of security threats. | en |
dc.description.sponsorship | Knut and Alice Wallenberg Foundation (Wallenberg Artificial Intelligence, Autonomous Systems and Software Program (WASP)) | en |
dc.description.status | Peer reviewed | en |
dc.description.version | Published Version | en |
dc.format.mimetype | application/pdf | en |
dc.identifier.citation | Cheng, P., Bagci, I. E., Roedig, U. and Yan, J. (2019) 'SonarSnoop: active acoustic side-channel attacks', International Journal of Information Security, 19(2), pp.213-228. https://doi.org10.1007/s10207-019-00449-8 | en |
dc.identifier.doi | 10.1007/s10207-019-00449-8 | en |
dc.identifier.eissn | 1615-5270 | |
dc.identifier.endpage | 228 | en |
dc.identifier.issn | 1615-5262 | |
dc.identifier.issued | 2 | en |
dc.identifier.journaltitle | International Journal of Information Security | en |
dc.identifier.startpage | 213 | en |
dc.identifier.uri | https://hdl.handle.net/10468/8524 | |
dc.identifier.volume | 19 | en |
dc.language.iso | en | en |
dc.publisher | Springer Verlag | en |
dc.relation.uri | https://link.springer.com/article/10.1007%2Fs10207-019-00449-8 | |
dc.rights | ©The Author(s) 2019. This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. | en |
dc.rights.uri | http://creativecommons.org/licenses/by/4.0/ | en |
dc.subject | Side-channel attack | en |
dc.subject | Acoustic system | en |
dc.subject | Active sonar | en |
dc.subject | Mobile device | en |
dc.title | SonarSnoop: active acoustic side-channel attacks | en |
dc.type | Article (peer-reviewed) | en |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Cheng2019_Article_SonarSnoopActiveAcousticSide-c.pdf
- Size:
- 1.38 MB
- Format:
- Adobe Portable Document Format
- Description:
- Published version
License bundle
1 - 1 of 1
Loading...
- Name:
- license.txt
- Size:
- 2.71 KB
- Format:
- Item-specific license agreed upon to submission
- Description: